Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
9acbc6b9342e22059c02db89c.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
9acbc6b9342e22059c02db89c.exe
Resource
win10v2004-20230703-en
General
-
Target
9acbc6b9342e22059c02db89c.exe
-
Size
141KB
-
MD5
6b92568277bb62bfca001d97cfd80112
-
SHA1
1dc9e48d193d2a2a9fae7ba1f72fbd960be52a0c
-
SHA256
9acbc6b9342e22059c02db89c629d56b2ada8b56abe94f2a901ed1252beac2cd
-
SHA512
ff514bab8f40d4fd84c0a4b5418f04fd5514d6b79e1171cdb812a14a225f817761b826e34cba27e16763ef14ae2471c7f2cd4e4ab39a888c40f048ce034224c6
-
SSDEEP
3072:tOwpch1pJKaGOCpxOF0A1SQHDWbSbgX+6VuBrRZpapKyqIkLOLhs+ChJzf0kY:IwpceaGOKE0AfH6bS56DKChzCjzf0kY
Malware Config
Extracted
F:\FILE RECOVERY.txt
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion/mallox/privateSignin
http://wtyafjyhwqrgo4a45wdvvwhen3cx4euie73qvlhkhvlrexljoyuklaad.onion
Signatures
-
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Renames multiple (2662) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Stops running service(s) 3 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation 9acbc6b9342e22059c02db89c.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\J: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\K: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\S: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\T: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\U: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\M: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\N: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\Q: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\A: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\B: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\E: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\H: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\L: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\R: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\W: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\Z: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\G: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\I: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\P: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\O: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\X: 9acbc6b9342e22059c02db89c.exe File opened (read-only) \??\Y: 9acbc6b9342e22059c02db89c.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 25 api.ipify.org -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\de-de\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\Library\SOLVER\SOLVER.XLAM 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Images\Stickers\Thumbnails\Sticker_Icon_MouseEar.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\AppTiles\contrast-black\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\p2\org.eclipse.equinox.p2.engine\profileRegistry\JMC.profile\.data\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\css\blafdoc.css 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\ProPlus2019XC2RVL_KMS_ClientC2R-ul.xrm-ms 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\CONCRETE\THMBNAIL.PNG 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\SplashScreen.scale-125.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\com.jrockit.mc.rcp.product_5.5.0.165303\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.core.databinding.property_1.4.200.v20140214-0004.jar 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsFeedbackHub_1.1907.3152.0_x64__8wekyb3d8bbwe\Assets\InsiderHubAppList.targetsize-48.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-white\AppPackageAppList.targetsize-60_contrast-white.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\contrast-white\FetchingMail.scale-400.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\Java\jdk1.8.0_66\db\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\loc_archives\en\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\Licenses16\VisioStdCO365R_SubTrial-ppd.xrm-ms 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\PAPYRUS\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\mscss7cm_en.dub 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Place\contrast-white\MedTile.scale-125.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftStickyNotes_3.6.73.0_x64__8wekyb3d8bbwe\Assets\NewNotePlaceholder-dark.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\Microsoft Office\root\Templates\Presentation Designs\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\WindowsApps\Microsoft.MicrosoftOfficeHub_18.1903.1152.0_x64__8wekyb3d8bbwe\css\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\features\org.eclipse.emf.ecore_2.10.1.v20140901-1043\META-INF\MANIFEST.MF 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\sdxs\sdxs.xml 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\sk\LC_MESSAGES\vlc.mo 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.contrast-white_targetsize-20_altform-unplated.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\WindowsApps\Microsoft.MSPaint_6.1907.29027.0_x64__8wekyb3d8bbwe\Assets\Videos\Help\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\Viewpoints\Dark\MilitaryRight.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\MSBuild\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Transit\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\images\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\Templates\1033\PersonalMonthlyBudget.xltx 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\RIPPLE\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\VideoLAN\VLC\locale\kk\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Directions\Work\LTR\contrast-black\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Getstarted_8.2.22942.0_x64__8wekyb3d8bbwe\Assets\GetStartedAppList.targetsize-30.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\HxMailLargeTile.scale-200.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\DataModel\Cartridges\trdtv2r41.xsl 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\LEVEL\LEVEL.INF 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\Assets\PhotosAppList.targetsize-60_altform-colorize.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\WindowsApps\Microsoft.Windows.Photos_2019.19071.12548.0_x64__8wekyb3d8bbwe\SlowMotionEditor\Views\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\missioncontrol\plugins\org.eclipse.e4.ui.workbench.renderers.swt.nl_ja_4.4.0.v20140623020002.jar 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\DeletedAllUserPackages\Microsoft.WindowsMaps_5.1906.1972.0_neutral_split.scale-125_8wekyb3d8bbwe\Assets\SecondaryTiles\Home\contrast-black\WideTile.scale-125.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppPackageSmallTile.scale-100_contrast-black.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.HEIFImageExtension_1.0.22742.0_x64__8wekyb3d8bbwe\Assets\contrast-black\AppList.targetsize-30_altform-unplated_contrast-black.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\StopwatchLargeTile.contrast-black_scale-200.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\images\themes\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\visualvm\config\Modules\org-netbeans-modules-core-kit.xml_hidden 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\Assets\Images\SkypeAppList.targetsize-48_altform-unplated_contrast-black.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\Windows Media Player\Skins\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\modules\locale\org-netbeans-modules-keyring_zh_CN.jar 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\AppxBlockMap.xml 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.People_10.1902.633.0_x64__8wekyb3d8bbwe\Assets\contrast-white\PeopleAppList.targetsize-256_altform-unplated.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.ScreenSketch_10.1907.2471.0_x64__8wekyb3d8bbwe\Assets\ScreenSketchSquare44x44Logo.targetsize-64_contrast-white.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\Assets\AppTiles\contrast-white\StoreMedTile.scale-200.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\GenericMailMediumTile.scale-100.png 9acbc6b9342e22059c02db89c.exe File created C:\Program Files\7-Zip\Lang\FILE RECOVERY.txt 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Microsoft3DViewer_6.1908.2042.0_x64__8wekyb3d8bbwe\Assets\LockScreenLogo.scale-125.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCalculator_10.1906.55.0_x64__8wekyb3d8bbwe\Assets\CalculatorAppList.targetsize-48_altform-unplated.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\microsoft.windowscommunicationsapps_16005.11629.20316.0_x64__8wekyb3d8bbwe\images\EMLAttachmentIcon.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\images\contrast-white\OneNoteSectionGroupMedTile.scale-400.png 9acbc6b9342e22059c02db89c.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\lib\visualvm\platform\update_tracking\org-netbeans-modules-sampler.xml 9acbc6b9342e22059c02db89c.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 5056 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Interacts with shadow copies 2 TTPs 1 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 4308 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4320 9acbc6b9342e22059c02db89c.exe 4320 9acbc6b9342e22059c02db89c.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4320 9acbc6b9342e22059c02db89c.exe Token: SeDebugPrivilege 4320 9acbc6b9342e22059c02db89c.exe Token: SeBackupPrivilege 1096 vssvc.exe Token: SeRestorePrivilege 1096 vssvc.exe Token: SeAuditPrivilege 1096 vssvc.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4320 wrote to memory of 5080 4320 9acbc6b9342e22059c02db89c.exe 88 PID 4320 wrote to memory of 1676 4320 9acbc6b9342e22059c02db89c.exe 90 PID 4320 wrote to memory of 5080 4320 9acbc6b9342e22059c02db89c.exe 88 PID 4320 wrote to memory of 5080 4320 9acbc6b9342e22059c02db89c.exe 88 PID 4320 wrote to memory of 1676 4320 9acbc6b9342e22059c02db89c.exe 90 PID 4320 wrote to memory of 1676 4320 9acbc6b9342e22059c02db89c.exe 90 PID 4320 wrote to memory of 4308 4320 9acbc6b9342e22059c02db89c.exe 89 PID 4320 wrote to memory of 4308 4320 9acbc6b9342e22059c02db89c.exe 89 PID 4320 wrote to memory of 3596 4320 9acbc6b9342e22059c02db89c.exe 94 PID 4320 wrote to memory of 3596 4320 9acbc6b9342e22059c02db89c.exe 94 PID 4320 wrote to memory of 3596 4320 9acbc6b9342e22059c02db89c.exe 94 PID 5080 wrote to memory of 5056 5080 cmd.exe 96 PID 5080 wrote to memory of 5056 5080 cmd.exe 96 PID 5080 wrote to memory of 5056 5080 cmd.exe 96 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\shutdownwithoutlogon = "0" 9acbc6b9342e22059c02db89c.exe -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\9acbc6b9342e22059c02db89c.exe"C:\Users\Admin\AppData\Local\Temp\9acbc6b9342e22059c02db89c.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4320 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C sc delete "MSSQLFDLauncher"&&sc delete "MSSQLSERVER"&&sc delete "SQLSERVERAGENT"&&sc delete "SQLBrowser"&&sc delete "SQLTELEMETRY"&&sc delete "MsDtsServer130"&&sc delete "SSISTELEMETRY130"&&sc delete "SQLWriter"&&sc delete "MSSQL$VEEAMSQL2012"&&sc delete "SQLAgent$VEEAMSQL2012"&&sc delete "MSSQL"&&sc delete "SQLAgent"&&sc delete "MSSQLServerADHelper100"&&sc delete "MSSQLServerOLAPService"&&sc delete "MsDtsServer100"&&sc delete "ReportServer"&&sc delete "SQLTELEMETRY$HL"&&sc delete "TMBMServer"&&sc delete "MSSQL$PROGID"&&sc delete "MSSQL$WOLTERSKLUWER"&&sc delete "SQLAgent$PROGID"&&sc delete "SQLAgent$WOLTERSKLUWER"&&sc delete "MSSQLFDLauncher$OPTIMA"&&sc delete "MSSQL$OPTIMA"&&sc delete "SQLAgent$OPTIMA"&&sc delete "ReportServer$OPTIMA"&&sc delete "msftesql$SQLEXPRESS"&&sc delete "postgresql-x64-9.4"&&rem Kill "SQL"&&taskkill -f -im sqlbrowser.exe&&taskkill -f -im sqlwriter.exe&&taskkill -f -im sqlservr.exe&&taskkill -f -im msmdsrv.exe&&taskkill -f -im MsDtsSrvr.exe&&taskkill -f -im sqlceip.exe&&taskkill -f -im fdlauncher.exe&&taskkill -f -im Ssms.exe&&taskkill -f -im SQLAGENT.EXE&&taskkill -f -im fdhost.exe&&taskkill -f -im fdlauncher.exe&&taskkill -f -im sqlservr.exe&&taskkill -f -im ReportingServicesService.exe&&taskkill -f -im msftesql.exe&&taskkill -f -im pg_ctl.exe&&taskkill -f -im postgres.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\sc.exesc delete "MSSQLFDLauncher"3⤵
- Launches sc.exe
PID:5056
-
-
-
C:\Windows\system32\vssadmin.exe"C:\Windows\sysnative\vssadmin.exe" delete shadows /all /quiet2⤵
- Interacts with shadow copies
PID:4308
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} bootstatuspolicy ignoreallfailures2⤵PID:1676
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c bcdedit /set {current} recoveryenabled no2⤵PID:3596
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:1096
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD56ce8282541672d356133d3e6b5106d2f
SHA1490d6748a84520cd9e74335d5f156869a2a880cb
SHA2567ad2bec27dbbe6386fe6892b5a41e004a1b7f10689818d42d7f96cb6b1f435e0
SHA512197ebd019ae9b2d0b4c12c3d7b84bd3b6e7789d9f174e0089a70055690d93f1f04932dc4700947e0a8ae5e34e46350760e2b6dccedac2e5360805d74fc2b63b8